Font Size: a A A

The Research, Design And Implementation Of Security Audit System On Special Control Of Computer

Posted on:2012-06-21Degree:MasterType:Thesis
Country:ChinaCandidate:H CengFull Text:PDF
GTID:2178330332488318Subject:Cryptography
Abstract/Summary:PDF Full Text Request
The special control of computer can not connect to LAN or WAN, which played the role of physical isolation in access to protected information, so that the security of protected information are basic safeguards. But the computer's log files due to physical isolation, the traditional method of protecting log file can not be implemented, the log file can only be stored locally, and local storage makes the security log file is difficult to be guaranteed. Log files for log audit is vital data, can not guarantee the security of the log file, The special control of computer's security audit is mentioned.In order to protect the safety of the log file, according to the special control of computer of log file practical needs, studies its security policy and protection technology, using windows driver technology, file hiding technology, file system monitoring technology and incremental Hash algorithm, the realization of the log files generated, storage and transfer on the special control of computer, protection of the special control of computer's log file confidentiality, integrity, controllability, availability and non-repudiation, the comprehensive protection of the special control of the computer log files security, to improve the audit function of the other operations and laid a solid foundation.
Keywords/Search Tags:Log Audit, Virtual Disk File, System Monitoring, Addition Hash Algorithm
PDF Full Text Request
Related items